More XSS vectors defanged
This commit is contained in:
parent
a6cbf38304
commit
aac197430c
|
@ -74,7 +74,7 @@ module HTML5lib
|
|||
xlink:show xlink:title xlink:type xml:base xml:lang xml:space xmlns
|
||||
xmlns:xlink y y1 y2 zoomAndPan]
|
||||
|
||||
ATTR_VAL_IS_URI = %w[href src cite action longdesc xlink:href]
|
||||
ATTR_VAL_IS_URI = %w[href src cite action longdesc xlink:href xml:base]
|
||||
|
||||
ACCEPTABLE_CSS_PROPERTIES = %w[azimuth background-color
|
||||
border-bottom-color border-collapse border-color border-left-color
|
||||
|
@ -139,6 +139,9 @@ module HTML5lib
|
|||
token.delete(:name)
|
||||
return token
|
||||
end
|
||||
when :Comment
|
||||
token[:data] = ""
|
||||
return token
|
||||
else
|
||||
return token
|
||||
end
|
||||
|
|
98
vendor/plugins/HTML5lib/tests/test_sanitizer.rb
vendored
98
vendor/plugins/HTML5lib/tests/test_sanitizer.rb
vendored
|
@ -307,4 +307,102 @@ class SanitizeTest < Test::Unit::TestCase
|
|||
output = "<p><tspan>\360\235\224\270</tspan> a</p>"
|
||||
check_sanitization(input, output, output, output)
|
||||
end
|
||||
|
||||
def test_should_handle_malformed_image_tags
|
||||
input = %(<img """><script>alert("XSS")</script>">)
|
||||
output = "<img/><script>alert(\"XSS\")</script>\">"
|
||||
rexmloutput = "Ill-formed XHTML!"
|
||||
check_sanitization(input, output, output, rexmloutput)
|
||||
end
|
||||
|
||||
def test_non_alpha_non_digit_II
|
||||
input = %(<a href!#\$%&()*~+-_.,:;?@[/|\]^`=alert('XSS')>foo</a>)
|
||||
output = "<a>foo</a>"
|
||||
rexmloutput = "Ill-formed XHTML!"
|
||||
check_sanitization(input, output, output, rexmloutput)
|
||||
end
|
||||
|
||||
def test_non_alpha_non_digit_III
|
||||
input = %(<a/href="javascript:alert('XSS');">foo</a>)
|
||||
output = "<a>foo</a>"
|
||||
rexmloutput = "Ill-formed XHTML!"
|
||||
check_sanitization(input, output, output, rexmloutput)
|
||||
end
|
||||
|
||||
def test_no_closing_script_tags
|
||||
input = %(<script src=http://ha.ckers.org/xss.js?<b>)
|
||||
output = "<script src=\"http://ha.ckers.org/xss.js?\"><b/>"
|
||||
rexmloutput = "Ill-formed XHTML!"
|
||||
check_sanitization(input, output, output, rexmloutput)
|
||||
end
|
||||
|
||||
def test_protocol_resolution_in_script_tag
|
||||
input = %(<script src=//ha.ckers.org/.j></script>)
|
||||
output = "<script src=\"//ha.ckers.org/.j\"></script>"
|
||||
rexmloutput = "Ill-formed XHTML!"
|
||||
check_sanitization(input, output, output, rexmloutput)
|
||||
end
|
||||
|
||||
def test_double_open_angle_brackets
|
||||
input = %(<img src=http://ha.ckers.org/scriptlet.html <)
|
||||
output = "<img src='http://ha.ckers.org/scriptlet.html'/><"
|
||||
rexmloutput = "Ill-formed XHTML!"
|
||||
check_sanitization(input, output, output, rexmloutput)
|
||||
|
||||
input = %(<script src=http://ha.ckers.org/scriptlet.html <)
|
||||
output = "<script src=\"http://ha.ckers.org/scriptlet.html\"><"
|
||||
rexmloutput = "Ill-formed XHTML!"
|
||||
check_sanitization(input, output, output, rexmloutput)
|
||||
end
|
||||
|
||||
def test_background_attribute
|
||||
input = %(<div background="javascript:alert('XSS')"></div>)
|
||||
output = "<div/>"
|
||||
xhtmloutput = "<div></div>"
|
||||
check_sanitization(input, output, xhtmloutput, xhtmloutput)
|
||||
end
|
||||
|
||||
def test_bgsound
|
||||
input = %(<bgsound src="javascript:alert('XSS');" />)
|
||||
output = "<bgsound src=\"javascript:alert('XSS');\"/>"
|
||||
rexmloutput = "<bgsound src=\"javascript:alert('XSS');\"></bgsound>"
|
||||
check_sanitization(input, output, output, rexmloutput)
|
||||
end
|
||||
|
||||
# This affects only NS4. Is it worth fixing?
|
||||
# def test_javascript_includes
|
||||
# input = %(<div size="&{alert('XSS')}">foo</div>)
|
||||
# output = "<div>foo</div>"
|
||||
# check_sanitization(input, output, output, output)
|
||||
# end
|
||||
|
||||
def test_link_stylesheets
|
||||
input =%(<link rel="stylesheet" href="javascript:alert('XSS');" />)
|
||||
output = "<link rel=\"stylesheet\" href=\"javascript:alert('XSS');\"/>"
|
||||
rexmloutput = "<link href=\"javascript:alert('XSS');\" rel=\"stylesheet\"/>"
|
||||
check_sanitization(input, output, output, rexmloutput)
|
||||
|
||||
input =%(<link rel="stylesheet" href="http://ha.ckers.org/xss.css" />)
|
||||
output = "<link rel=\"stylesheet\" href=\"http://ha.ckers.org/xss.css\"/>"
|
||||
rexmloutput = "<link href=\"http://ha.ckers.org/xss.css\" rel=\"stylesheet\"/>"
|
||||
check_sanitization(input, output, output, rexmloutput)
|
||||
end
|
||||
|
||||
def test_list_style_image
|
||||
input = %(<li style="list-style-image: url\(javascript:alert\('XSS'\)\)">foo</li>)
|
||||
output = "<li style=''>foo</li>"
|
||||
check_sanitization(input, output, output, output)
|
||||
end
|
||||
|
||||
def test_IE_Comments
|
||||
input = %(<!--[if gte IE 4]><script>alert\('XSS'\);</script><![endif]-->)
|
||||
output = ""
|
||||
check_sanitization(input, output, output, output)
|
||||
end
|
||||
|
||||
def test_xml_base
|
||||
input =%(<div xml:base="javascript:alert('XSS');//">foo</div>)
|
||||
output = "<div>foo</div>"
|
||||
check_sanitization(input, output, output, output)
|
||||
end
|
||||
end
|
||||
|
|
Loading…
Reference in a new issue